Journal: IJIPT

Volume 14, Issue 4

189 -- 196Xuelian Yang. Iterative learning feedback control of network inverse system
197 -- 204Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif. The quality factor for detecting node isolation attack in mobile ad hoc networks using OLSR protocol
205 -- 218Amrit Suman, Chiranjeev Kumar, Preetam Suman. Advance routing strategy for VANETs
219 -- 231Yanli Li, Xiaonan Wang. Position-related content acquisition for CCM
232 -- 239Junjun Liu, Jian Wu, Lanzhong Guo. Construction of emergency dispatching and controlling platform for multi-elevator in cloud computing
240 -- 247Jia Chen, Yingkai Miao. Study on network security intrusion target detection method in big data environment
248 -- 255Daqin Wu, Haiyan Hu, Zheng Xie. Design of hole repair system for wireless sensor networks based on triangle partition

Volume 14, Issue 3

131 -- 138Ruixia Feng, Tinghua Li, Junliang Dong. New media fine art education platform based on internet of things technology
139 -- 146Huawei Wu, Chuan Sun, Yicheng Li, Yong Kuang. Simulation on dynamic load balancing of distributed parallel computing network system
147 -- 154Shu Xu. Deep mining method for high-dimensional big data based on association rule
155 -- 161Jia Chen, Yingkai Miao. Research on security evaluation system of network information system based on rough set theory
162 -- 168Shu Xu. Analysis method for structured big data feature based on hypernetwork model
169 -- 176Hao Wang, Hai Huang, Anxin Chen, Xiaoqing Li, Fangui Li. Real-time fault diagnosis method for low-voltage power line carrier communication network based on network topology
177 -- 187Prashant Kharat, Muralidhar Kulkarni. ModQUIC protocol performance verification with CUBIC and BBR congestion control mechanisms

Volume 14, Issue 2

59 -- 66Kaibin Wei. Simulation research of nodes target tracking algorithm based on clustering in wireless sensor network
67 -- 76Guanlin Chen, Kunlong Zhou, Yubo Peng, Liang Zhou, Yong Zhang. A novel network intrusion prevention system based on Android platform
77 -- 85Yong Li, Bo Li, Mao Yang. Unsaturated traffic oriented spatial clustering multiusers MAC protocol for the next generation WLAN
86 -- 92Lu Wang, Difei Jiang. Energy management control system of prefabricated construction based on internet of things technology
93 -- 101Jingbo Hu. Mathematical model construction of communication security assessment method based on TST switching network matrix
102 -- 111Juefu Liu. Research on resource allocation algorithm of wireless network based on game feedback
112 -- 119Simarjeet Kaur, Navdeep Kaur, Kamaljit Singh Bhatia. An extended mechanism to prevent distributed denial of service attack in DV-Hop localisation algorithm in wireless sensor networks
120 -- 130Abdelhakim Dafeur, Bernard Cousin, Rezki Ziani. Multicast routing and allocation of wavelengths in a WDM network with splitters and converters

Volume 14, Issue 1

1 -- 9Ying Liu, Hai Tao Liu. Integrated monitoring algorithms for software data security situation on private cloud computing platform
10 -- 15Qingzeng Xu. Wireless sensor networks secure routing algorithm based on trust value computation
16 -- 22Xiaohai Lan. Big data network security index correlation measure based on the fusion of modified two order cone programming model
23 -- 32Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Bo Su, Liang Zhao. Research on the on-demand scheduling algorithm of intelligent routing load based on SDN
33 -- 40Liejun Wang, Long Pan, Jiwei Qin. Graph-based recommendation by trust
41 -- 48Lede Niu, Liran Xiong. A novel optimal road layout model based on urban cloud data
49 -- 58Somnath Sinha, Aditi Paul. A novel neuro-fuzzy-based localisation system for WSN using node proximity